[OpenID] Question regarding the OpenID Information Cards 1.0

Johnny Bufu johnny at sxip.com
Tue Sep 4 17:48:55 UTC 2007


On 4-Sep-07, at 7:46 AM, Peter Williams wrote:

>> 11.2.  Verifying Discovered Information requires that:
>>
>> "[...] the Relying Party MUST perform discovery on the Claimed
>> Identifier in the response to make sure that the OP is authorized to
>> make assertions about the Claimed Identifier."
>
> [Peter Williams]
>
> Last week, from memory I wrote "There is a step 5. The RP must  
> identify
> the OP(s) associated with the Claimed_Identity, as published by the  
> user
> in his/her HTML/XRDS file."
>
> This was worried me ever since.

I don't really see any issues. Please see my comments below.

> 1. In the traditional flow, we do discovery on the user's "claimed
> input", as normalized. This is an authority-to-speakfor control, done
> pre assertion validation. Without authority established, don't even  
> send
> auth req.

Without the authority being determined (== discovered), there's no  
endpoint to send the auth req to.

If the OP replies with a different claimed_identifier, or just issues  
an unsolicited response, the RP is required to validate the assertion  
in the normal flow, and part of it is validating the discovered  
information.

> 2. In the token-based flow, the equivalent discovery control is on the
> Claimed_Identity. This is the authority--speak-for control, done post
> assertion validation. Without authority established, don't validate  
> auth
> resp.

Not *post* assertion validation : discovered information is *part of*  
assertion validation. The whole assertion is not validated until all  
four validation steps are completed.

> We know the Claimed_Identity is allowed fragments etc, on the token
> flow. The user's input was not, in the non-token flow. Yet they are
> performing the same security control. Internal inconsistency: alarm
> bells sounded.

I think it would be a lot easier to follow if you have a example  
where the validation doesn't work correctly, in either flow.  
Personally I don't see any issues.

> To be consistent, one could normalize the Claimed_Identity as in the
> non-token flow.

Normalization is only applied to the user's input. The claimed_id is  
already in the normalized form. If it is not, the validation will fail.


Johnny




More information about the general mailing list